Suspicious Object List Exporter and Importer User Guide. Using Suspicious Object List Exporter
|
|
- Roderick Marshall
- 6 years ago
- Views:
Transcription
1 Suspicious Object List Exporter and Importer User Guide The Trend Micro Control Manager Suspicious Object List Exporter and Importer tools allow you to export and import Control Manager Suspicious Object lists without having to sign in to the Control Manager management console. Suspicious Object List Exporter: Exports Suspicious Object lists from the Control Manager server in multiple file formats. Suspicious Object List Importer: Imports properly formatted comma-separated value (CSV) suspicious object data into Control Manager. Use the Exporter and Importer tools to synchronize suspicious object data across multiple Control Manager servers and supported third-party applications to enhance your protection against unknown and emerging threats. Using Suspicious Object List Exporter Use the Suspicious Object List Exporter tool to export Control Manager Suspicious Object lists in multiple file formats. By default, the Suspicious Object List Exporter tool exports suspicious object data in XML format. For details on how to change the output file format, see Modifying the Configuration File on page 6. The Suspicious Object List Exporter tool requires Control Manager 6.0 Service Pack 3 Patch 2 or later. To download the latest installation package, see index.php?regs=nabu&clk=latest&clkval=4202&lang_loc=1. Procedure 1. Install Hotfix 3453 on the Control Manager server. 1
2 2. Open a command prompt. 3. Use the following command to locate the directory which contains the SuspiciousObjectExporter.exe file: cd <Control Manager installation directory>\sotools 4. Execute SuspiciousObjectExporter.exe using the following command: SuspiciousObjectExporter.exe [/s <Start ID> /e <End ID>] [/f <y n>] [/d] Note Running SuspiciousObjectExporter.exe without any parameters displays usage details and prompts you to provide <Start ID> and <End ID> values. 2
3 PARAMETER DESCRIPTION EXAMPLE /s <Start ID> Indicates the ID of the first object to export Note Requires that you specify the /e <End ID> value Specifying a value of 0 indicates the start of the list er.exe /s 0 /e 0 Exports all suspicious objects and locks the command line interface during the export process er.exe /s 3 /e 8 Exports suspicious objects starting from ID 3 to ID 8 and locks the command line interface during the export process er.exe /s 0 /e 4 Exports suspicious objects starting from the beginning of the list to ID 4 and locks the command line interface during the export process 3
4 PARAMETER DESCRIPTION EXAMPLE /e <End ID> Indicates the ID of the last object to export Note Requires that you specify the /s <Start ID> value Specifying a value of 0 indicates the end of the list er.exe /s 0 /e 0 Exports all suspicious objects and locks the command line interface during the export process er.exe /s 3 /e 8 Exports suspicious objects starting from ID 3 to ID 8 and locks the command line interface during the export process er.exe /s 4 /e 0 Exports suspicious objects starting from ID 4 to the end of the list and locks the command line interface during the export process 4
5 PARAMETER DESCRIPTION EXAMPLE /f <y n> Specifies whether to lock the command line interface during the export process Note Optional parameter; if not specified, the default is "yes" You must specify the following parameter in the Add arguments (optional) field when scheduling automatic exports using the SuspiciousObjectExpor ter.exe tool, a PowerShell script, or a batch script in Windows Task Scheduler: er.exe /f y Exports all suspicious objects and locks the command line interface during the export process er.exe /s 0 /e 0 /f y Exports all suspicious objects and locks the command line interface during the export process er.exe /f n Exports all suspicious objects and unlocks the command line interface during the export process /f n /d Use to enable debug mode Note Optional parameter normally used by Support to identify errors SuspiciousObjectExporter.e xe /d Exports all suspicious objects with additional debugging logs 5. To view the exported Suspicious Object list, go to the <Control Manager installation directory>\sotools\ directory and open the SuspiciousObjectList.xml file. 5
6 6. To view all export logs, go to the <Control Manager installation directory>\sotools\ directory and open the ExportRecord.txt file. Modifying the Configuration File To change the default configuration settings, go to the <Control Manager installation directory>\sotools directory and modify the SuspiciousObjectExporter.exe.config file. KEY DESCRIPTION EXAMPLE outputrootfold erpath Location: <appsettings> outputfolderna me Location: <appsettings> Indicates the working directory for the SuspiciousObj ectexporter.e xe tool Indicates the output directory for the exported Suspicious Object list file <add key="outputrootfolderpath" value="."/> The tool uses the directory in which the SuspiciousObjectExporter.exe program resides to process the lists <add key="outputrootfolderpath" value="c:\program Files (x86)\trend Micro\Control Manager"/> The tool uses the specified directory (C: \Program Files (x86)\trend Micro \Control Manager) to process the lists <add key="outputfoldername" value="sotools"/> Exports the file to the SOTools directory <add key="outputfoldername" value="solist"/> Exports the file to the <outputrootfolderpath>\solist directory 6
7 KEY DESCRIPTION EXAMPLE stylesheetfile Location: <appsettings> Indicates the style sheet that the tool applies to the exported list <add key="stylesheetfile" value=""/> Exports all lists in XML format to a *.txt or *.xml file as specified by the outputfile key <add key="stylesheetfile" value="exportcsv.xslt"/> Used to export the Virtual Analyzer Suspicious Object list, User-Defined Suspicious Object list, or Exception list with a limited subset of columns in CSV format You can use the ExportCSV.xslt style sheet to export other Suspicious Object lists, however, you cannot re-import the lists back into Control Manager. After selecting the ExportCSV.xslt style sheet, you can no longer configure which columns the tool exports. The tool only exports the columns specified in the style sheet. <add key="stylesheetfile" value="exportstix.xslt"/> Used to export all Suspicious Object lists in STIX format <add key="stylesheetfile" value="exportcpl.xslt"/> Used to export all Suspicious Object lists in CPL format 7
8 KEY DESCRIPTION EXAMPLE "outputfile" Location: <appsettings> <suspiciousobj ectcolumns> Location: <sodatacolumn Settings> Indicates the file name and extension of the exported Suspicious Object list file Specify a new file extension to change the output file format Indicates the data columns on the selected list Set isenable="tru e" to export the specified data column <add key="outputfile" value="suspiciousobjectlist.xml"/> Exports the Suspicious Object list as an.xml file named SuspiciousObjectList.xml <add key="outputfile" value="suspiciousobjectlist.txt"/> Exports the Suspicious Object list as a.txt file named SuspiciousObjectList.txt <add id="1" name="seqid" isenable="true"></add> Exports the "SeqID" data column from the selected list <add id="1" name="md5key" isenable="false"></add> Explicitly excludes the "MD5Key" data column from the selected list <suspiciousobj ecttypelist> Location: <sotypesettin gs> Indicates the types of objects to export from the selected list Set isenable="tru e" to export the specified object type If you specified the ExportCSV.xslt style sheet, the tool only exports the columns specified in the style sheet. <add value="0" description="ip" isenable="true"></add> Exports all IP address type objects from the selected list <add value="1" description="domain" isenable="false"></add> Explicitly excludes all "Domain" objects from the exported list 8
9 KEY DESCRIPTION EXAMPLE <suspiciousobj ectsourcetype > Location: <sotypesettin gs> Indicates the suspicious object source type Set isenable="tru e" to export the specified object type <add value="0" description="sourcetype" isenable="true"/> Selects the Virtual Analyzer Suspicious Object list <add value="1" description="sourcetype" isenable="true"/> Selects the User-Defined Suspicious Object list <add value="2" description="sourcetype" isenable="true"/> Selects the Virtual Analyzer Exception list If you specified the ExportCSV.xslt style sheet and select the Virtual Analyzer Suspicious Object list or the User-Defined Suspicious Object list, the tool exports the following columns: Object, Type, At Risk Endpoints/ Recipients, Notes and Scan Action. If you specified the ExportCSV.xslt style sheet and select the Virtual Analyzer Exception list, the tool exports the following columns: Object, Type, At Risk Endpoints/Recipients, and Notes. Using Control Manager to Export the Virtual Analyzer Exception List Control Manager only supports exporting the Virtual Analyzer Suspicious Object Exception list in CSV format. 9
10 Procedure 1. Go to Administration > Suspicious Objects > Virtual Analyzer Objects The Virtual Analyzer Suspicious Objects screen appears. 2. Click the Exceptions tab. 3. Click Export All. A progress screen appears. 4. When the export finishes, click Download. A confirmation box appears. 5. Click Save. The Save As screen appears. 6. (Optional) Specify a new location or file name. 7. Click Save. Using Control Manager to Export the User- Defined List Control Manager only supports exporting the User-Defined Suspicious Object list in CSV format. Procedure 1. Go to Administration > Suspicious Objects > User-Defined Objects The User-Defined Suspicious Objects screen appears. 2. Click Export All. 10
11 A progress screen appears. 3. When the export finishes, click Download. A confirmation box appears. 4. Click Save. The Save As screen appears. 5. (Optional) Specify a new location or file name. 6. Click Save. Using Suspicious Object List Importer Use the Suspicious Object List Importer tool to import properly formatted *.csv files of suspicious object data into Control Manager. The Suspicious Object List Importer tool requires Control Manager 6.0 Service Pack 3 Patch 2 or later. To download the latest Control Manager installation package, see downloadcenter.trendmicro.com/index.php? regs=nabu&clk=latest&clkval=4202&lang_loc=1. Procedure 1. Install Hotfix 3453 on the Control Manager server. 2. Open a command prompt. 3. Use the following command to locate the directory which contains the ImportSOFromCSV.exe file: cd <Control Manager installation directory> 4. Execute ImportSOFromCSV.exe using the following command: 11
12 ImportSOFromCSV.exe "<full path>" {UserDefinedSO ExceptionSO} Where: <full path>: Indicates the directory and file name of the properly formatted CSV file {UserDefinedSO}: Indicates the file that contains User-Defined Suspicious Object list data {ExceptionSO}: Indicates the file that contains Virtual Analyzer Exception list data For example: SuspiciousObjectImporter.exe "c:\program Files (x86)\trend Micro\Control Manager \importexceptionsample.csv" ExceptionSO Imports the importexceptionsample.csv file from the c:\program Files (x86)\trend Micro\Control Manager directory to the Virtual Analyzer Exception list in Control Manager Using Control Manager to Import the Virtual Analyzer Exception List Control Manager only supports importing properly formatted *.csv files of Virtual Analyzer Exception list data. Procedure 1. Go to Administration > Suspicious Objects > Virtual Analyzer Objects The Virtual Analyzer Suspicious Objects screen appears. 2. Click the Exceptions tab. 12
13 3. Click Import. The Import Exception screen appears. 4. Click Browse... and select the *.csv file containing the Exception list data. 5. Click Open. 6. Click Import. The Import Exception screen closes and the imported exceptions appear in the Virtual Analyzer Suspicious Object Exception list. Using Control Manager to Import the User- Defined List Control Manager only supports importing properly formatted *.csv files of user-defined suspicious object data. Procedure 1. Go to Administration > Suspicious Objects > User-Defined Objects The User-Defined Suspicious Objects screen appears. 2. Click Import. The Import User-Defined List screen appears. 3. Click Browse... and select the *.csv file containing the user-defined suspicious object data. 4. Click Open. 5. Click Import. 13
14 The Import User-Defined List screen closes and the imported objects appear in the User-Defined Suspicious Object list. 14
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSIEM Solution Integration With Control Manager
Contents Introduction... 3 Overview... 3 Direct Mode... 4 Bridge Mode... 5 Functional Design... 5 SNMP Trap... 6 Syslog... 6 Log Forwarder Tool... 9 Configure LogForwarder Settings... 10 Trigger Application...
More informationUpgrade EZ-Pay V6 Guide
Upgrade EZ-Pay V6 Guide Who should use this patch Users who are using versions 3.0.4 of EZ-Pay can upgrade to version 3.1.0 Where to get this patch Download it from http://www.hr21.com.hk/ -> Products->
More information1.1 ing an Individual Contact or Selected Contacts (Non Synchronous)
USC Marshall School of Business Marshall Information Services Outlook 2013 Sharing Contacts and Distribution Lists There are several method available for sharing contacts. 1.1 Emailing a Single or Selected
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationIntegrate Trend Micro Control Manager. EventTracker v8.x and above
Integrate Trend Micro Control Manager EventTracker v8.x and above Publication Date: May 24, 2018 Abstract This guide provides instructions to configure Trend Micro Control Manager to generate logs for
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationThis document provides instructions for the following products.
1.1 Introduction 1.1.1 Purpose 1.1.2 Scope To install anti-virus software on the Brevera Breast Biopsy system with CorLumina imaging technology system. This document applies to all CorLumina systems with
More informationZENworks 11 Support Pack 4 Endpoint Security Utilities Reference. October 2016
ZENworks 11 Support Pack 4 Endpoint Security Utilities Reference October 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.
More information8. Printing and exporting portfolio information
8. Printing and exporting portfolio information Portfolio Manager provides a variety of options for customizing and printing reports of portfolio account information. For batch printing, you can specify
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release
More informationQuestion: How do I move my mobile account from the Corporate to my Personal Account?
Question: How do I move my mobile account from the Corporate to my Personal Account? Answer: A user leaving Nortel can move his/her account off of the corporate program and into a personal liable account.
More informationTable of Contents DATA MANAGEMENT TOOLS 4. IMPORT WIZARD 6 Setting Import File Format (Step 1) 7 Setting Source File Name (Step 2) 8
Data Management Tools 1 Table of Contents DATA MANAGEMENT TOOLS 4 IMPORT WIZARD 6 Setting Import File Format (Step 1) 7 Setting Source File Name (Step 2) 8 Importing ODBC Data (Step 2) 10 Importing MSSQL
More informationOrder Fulfillment. Note: The term IYC website refers to a gift card website built with IYC SiteBuilder.
The page contains a listing and a brief invoice of physical and electronic gift card orders received through an It s Your Card (IYC) website. Orders may be processed directly through Lighthouse Transaction
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release
More informationZENworks 2017 Update 2 Endpoint Security Utilities Reference. February 2018
ZENworks 2017 Update 2 Endpoint Security Utilities Reference February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.
More informationMEDIASEAL Encryptor Client Manual
MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change
More informationManually Configuring IIS
Manually Configuring IIS This application note describes how to manually configure Microsoft's Internet Information Server (IIS) and the ProHelp EPM Web Reporting option. This configuration is typically
More informationClient Proxy interface reference
McAfee Client Proxy 2.3.3 Interface Reference Guide (McAfee epolicy Orchestrator) Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI.
More informationUse SecurityTestRunner to run Ready! API's security tests from the command line.
SecurityTest Runner SecurityTestRunner runs security tests. Use SecurityTestRunner to run Ready! API's security tests from the command line. You can start the runner from the command line or from the Ready!
More informationAutomating Administration with Windows PowerShell 2.0
Automating Administration with Windows PowerShell 2.0 Course No. 10325 5 Days Instructor-led, Hands-on Introduction This course provides students with the knowledge and skills to utilize Windows PowerShell
More informationClient Proxy interface reference
McAfee Client Proxy 2.3.5 Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee
More informationInterfacing with MS Office Conference 2017
Conference 2017 Session Description: This session will detail procedures for importing/exporting data between AeriesSIS Web Version/AeriesSIS Client Version and other software packages, such as word processing
More informationEndpoint Security Utilities Reference
www.novell.com/documentation Endpoint Security Utilities Reference ZENworks 11 Support Pack 2 November 08, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
More informationMC2-ICE Integration with Prime Bid
MC2-ICE Integration with Prime Bid The process of transferring costs from ICE to Prime Bid (integration) is based on exporting the information from an estimate (sections and costs) via custom Crystal Report
More information1 Page Compass Investors, LLC P.O. Box 94 Kenilworth, IL
Updating a Local Firewall for Proper Site Access These steps are needed to allow proper functioning of and access to the subscriber areas of the Compass Investors website. These instructions include several
More informationAdditel/LogII Wireless Data Logging Software. User Manual
Additel/LogII Wireless Data Logging Software User Manual Additel Corporation 2013-8 Contents Chapter One: Overview... 3 1. Introduction...3 2. System Requirements...3 3. Software Installation...3 Chapter
More informationCAS Quick Deployment Guide January 2018
CAS January 2018 Page 2 of 18 Trend Micro CAS January 2018 This document is to guide TrendMicro SE and Solution Architect team run a successful Cloud App Security POC with prospective customers. It is
More informationURGENT: MEDICAL DEVICE CORRECTION
30 October 2017 The issues described in the attached letter only occur during an import of a drug library. If you have performed an import of a Plum 360 drug library or there is a need to perform an import
More informationMYOB Accountants Office
MYOB Accountants Office There are two aspects to the interface between BankLink Practice and MYOB AO: Copying the client chart from MYOB AO into BankLink Practice Transferring coded transactions from BankLink
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationClient Proxy interface reference
Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page
More informationDeploying SecPod Saner Agent Through Microsoft Active Directory
Deploying SecPod Saner Agent Through Microsoft Active Directory Introduction This article lists instructions to install SecPod Saner agent through Microsoft Active Directory. Steps Involved in Deploying
More informationTransaction Import Setup
Transaction Import Setup Before transactions can be imported an Import Template should be setup. This is selected from the Setup Defaults section on the menu bar. The setup screen allows for one or more
More informationVMware Horizon Session Recording Fling:
VMware Horizon Session Recording Fling: The VMware Horizon Session Recording fling allows administrators to record VMware Blast Extreme sessions to a central server for playback. These recordings can be
More informationTrend Micro OfficeScan Client User Guide
Trend Micro OfficeScan Client User Guide Overview The purpose of this document is to provide users with information on the Trend Micro OfficeScan antivirus client. OfficeScan is the new anti-virus/anti-malware
More informationTrend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central
Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT File Delete and Data Wiping Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing
More informationFreeFlow Accxes version January Xerox FreeFlow Accxes Account Management Tool Customer Release Notes
FreeFlow Accxes version 14.01.12 January 2010 Xerox FreeFlow Accxes Account Management Tool Customer Release Notes 2010 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design,
More informationAdobe Connect Pro Building Block. Install Guide
Adobe Connect Pro Building Block Last update: June 11, 2011 Install Guide Introduction The Adobe Connect Pro Building Block gives Blackboard Learn Instructors, Teaching Assistants and Course Builders the
More informationComposer Help. Import and Export
Composer Help Import and Export 2/7/2018 Import and Export Contents 1 Import and Export 1.1 Importing External Files into Your Composer Project 1.2 Importing Composer Projects into Your Workspace 1.3 Importing
More informationREAD ME for People Manager - Version 3.03
READ ME for People Manager - Version 3.03 In this document: Changed Features in People Manager 3.03 Changed Features in People Manager 3.02 Changed Features in People Manager 3.01 Changes to User Manual
More informationZENworks 2017 Update 1 Quick Reference - Bundle Features and Options
ZENworks 2017 Update 1 Quick Reference - Bundle Features and Options July 2017 The information in this document helps you to quickly and easily find the information related to various bundle features and
More informationPennsylvania Taxes Conversion Tool
Task Sheet Pennsylvania Taxes Conversion Tool The Pennsylvania Taxes Conversion tool assists you with converting a Millennium database from using the current (or old ) local taxes to the new method of
More informationAir Gap AntiVirus Guide Version 8.5 Update 2
Air Gap AntiVirus Guide Version 8.5 Update 2 Endpoint Security powered by HEAT Software Contents Contents 2 Requirements 3 Air Gap Software Requirements 4 Air Gap Checklist 5 AntiVirus Configuration for
More informationIVANTI ENVIRONMENT MANAGER POLICY QUICK START GUIDE. Environment Manager Policy. Ivanti. Quick Start Guide
Ivanti Environment Manager Policy Quick Start Guide WWW.IVANTI.COM +1-888-253-6201 1 Contents Quick Start Guide...3 About Environment Manager Policy...3 Feature Summary...4 Preparing for Installation...5
More informationMcafee epo. Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0
Mcafee epo Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ McAfee MA0-100 McAfee Certified Product Specialist-ePO Practice Test Version: 4.0 Exam A QUESTION
More informationWorkSpace - Step 1. Step-by-Step Guide
WorkSpace - Step 1 Step-by-Step Guide DATE: NOVEMBER 21, 2017 1 Section 1: Introduction WorkSpace - Step 1 WorkSpace Step 1 (www.mswstep1.com) is an IT inventory processing service that transforms and
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationVMware Mirage Web Manager Guide
Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationUniversity of North Dakota PeopleSoft Finance Tip Sheets. Utilizing the Query Download Feature
There is a custom feature available in Query Viewer that allows files to be created from queries and copied to a user s PC. This feature doesn t have the same size limitations as running a query to HTML
More informationLastPass Enterprise Recommended Policies Guide
LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies
More informationOracle Database Express Edition
Oracle Database Express Edition Getting Started Guide 11g Release 2 (11.2) E18585-04 July 2011 Welcome to Oracle Database Express Edition (Oracle Database XE). This guide gets you quickly up and running
More informationIntroduction. 1. Deactivating Anti-Executable Enterprise. 2. Updating the virus definitions 3. Reactivating Anti-Executable Enterprise.
Introduction The process of updating virus definitions on workstations protected by Faronics Anti-Executable Enterprise involves three fundamental steps: 1. Deactivating Anti-Executable Enterprise. 2.
More informationPerceptive Content. Release Notes. Version: 7.0.x
Perceptive Content Release Notes Version: 7.0.x Written by: Product Knowledge, R&D Date: February 2016 2015-2016 Lexmark International Technology, S.A. All rights reserved. Lexmark is a trademark of Lexmark
More informationIn order for grades to be imported into GradeSpeed, the following qualifications must be met for each file type below:
Importing Grades into GradeSpeed In order for grades to be imported into GradeSpeed, the following qualifications must be met for each file type below: Example 1: In Microsoft Excel, the workbook must
More informationInviso SA. Step-by-Step Guide DATE: NOVEMBER 21, 2017
Inviso SA Step-by-Step Guide DATE: NOVEMBER 21, 2017 1 Section 1: Introduction Inviso Software Analyzer The Inviso Software Analyzer (InvisoSA.com) is an IT inventory processing service that transforms
More informationCounterACT IOC Scanner Plugin
CounterACT IOC Scanner Plugin Version 2.0.1 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities... 5 Use CounterACT Policy
More informationAdditel/LogII Data Logging Software. User Manual
Additel/LogII Data Logging Software User Manual Additel Corporation 2013-3 Contents Chapter One: Overview... 3 1. Introduction...3 2. System Requirements...3 3. Software Installation...3 Chapter Two: Functions...
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 10.5 Feb 2018 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More information!!! !!!!!!!!!!! Help Documentation. Copyright V1.7. Copyright 2014, FormConnections, Inc. All rights reserved.
Help Documentation V1.7 Copyright Copyright 2014, FormConnections, Inc. All rights reserved. 1 of 32 FormConnect Help 1. Overview FormConnect is an easy to use app for creating business forms on your ipad.
More informationPearl Echo.Suite Quick Start Installation Guide
WORKSTATION SERVER Pearl Echo.Suite Quick Start Installation Guide Your initial test setup should take between 5 and 15 minutes. For detailed automated deployment instructions and configuration settings
More informationEXPORT MANAGER USER GUIDE
EXPORT MANAGER USER GUIDE Table of Contents Table of Contents 1 Overview 2 General Concepts 2 Creating a Job 3 General Properties 4 Source Properties 4 Export Properties 4 Running Jobs 5 Options 5 Export
More informationDell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager. User's Guide
Dell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make
More informationPortfolio Link Server Application. Telemet America, Inc.
Portfolio Link Server Application Telemet America, Inc. Table of Contents Telemet Portfolio Link - Server Application... 3 Portfolio Link Server Application Setup Steps... 3 Config.xml Modification:...
More informationOsteoporosis Assessment LORAD Breast Cancer Detection DirectRay Digital Imaging FLUOROSCAN C-arm Imaging TITLE DOCUMENT NUMBER REV
Artwork consists of: Ten pages, 8.5 11 inch, attached. REV AUTHORED BY DATE C. LUU 12/18/13 REV DRAFTED BY DATE C. LUU 12/18/13 PROPRIETARY: This document contains proprietary data of Hologic, Inc. No
More informationHow to Convert a Scored MMPI -2 Report to an MMPI-2-RF Report Using Q Local
How to Convert a Scored MMPI -2 Report to an MMPI-2-RF Report Using Q Local 2.2.22 This document will walk you through exporting a scored MMPI-2 using Q Local 2.2.22. Conversion is essentially a three-step
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationOfficeScanTM 10 For Enterprise and Medium Business
OfficeScanTM 10 For Enterprise and Medium Business Installation and Upgrade Guide es Endpoint Security Trend Micro Incorporated reserves the right to make changes to this document and to the products
More informationAdding Users. Adding Users CHAPTER
CHAPTER 15 You can use Cisco Unified Communications Manager Bulk Administration (BAT) to add a group of new users and to associate users to phones and other IP Telephony devices in the Cisco Unified Communications
More information1. Introduction Features Operating Environment Machine Data...6
1 Table of Contents 1. Introduction...3 1.1 Features... 4 1.2 Operating Environment... 5 2. Machine Data...6 2.1 Fetching New Machines... 8 2.2 Adding New Machines... 10 2.3 Updating Scan Data... 12 2.4
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to
More informationManual Speedy Report. Copyright 2013 Im Softly. All rights reserved.
1 Manual Speedy Report 2 Table of Contents Manual Speedy Report... 1 Welcome!... 4 Preparations... 5 Technical Structure... 5 Main Window... 6 Create Report... 7 Overview... 7 Tree View... 8 Query Settings
More informationOverview Using TG Scan Answer Sheet FAQ Support
Overview Using TG Scan Answer Sheet FAQ Support TG Scan TG Scan is an add-on utility for Test Generator that facilitates importing test answersheet data into TG s database. Scanners and Answer Sheets TG
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSophos Central Admin. help
help Contents About Sophos Central... 1 Activate Your License...2 Overview... 3 Dashboard...3 Alerts...4 Logs & Reports... 10 People... 25 Devices... 34 Global Settings...50 Protect Devices...78 Endpoint
More informationCA Productivity Accelerator Single User Installation
CA Productivity Accelerator Congratulations on your purchase of the CA Productivity Accelerator (CA PA). This document will provide you with the information you will need to install the Single User Developer
More informationManually Run Ad Logon Script As Administrator Group Policy
Manually Run Ad Logon Script As Administrator Group Policy Startup Scripts for _Group Policy object_ : Lists all the scripts that currently are assigned By default, members of the Domain Administrators
More informationOOOCTA Version 4.1. Installation and Users Guide.
OOOCTA Version 4.1 Installation and Users Guide www.telnetport25.com Contents Introduction... 2 Pre-Requisites... 2 Changes from Version 3.5... 2 Changes from Version 4.0... 2 Installation and Setup...
More informationForeScout Extended Module for IBM BigFix
ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...
More informationCOGNOS BI I) BI introduction Products Introduction Architecture Workflows
COGNOS BI I) BI introduction Products Architecture Workflows II) Working with Framework Manager (Modeling Tool): Architecture Flow charts Creating Project Creating Data Sources Preparing Relational Metadata
More informationThis course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.
Trend Micro Trend Micro Deep Discovery Training for Certified Professionals Course ID: TMCPDD Course Overview Course Duration: 3 Days Trend Micro Deep Discovery Training for Certified Professionals is
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationDiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd.
DiskSavvy DISK SPACE ANALYZER User Manual Version 10.3 Dec 2017 www.disksavvy.com info@flexense.com 1 1 Product Overview...3 2 Product Versions...7 3 Using Desktop Versions...8 3.1 Product Installation
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationVMware Mirage Web Management Guide. VMware Mirage 5.9.1
VMware Mirage Web Management Guide VMware Mirage 5.9.1 VMware Mirage Web Management Guide You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationAppSense Environment Manager. Personalization Product Guide Version 10.0
AppSense Environment Manager Personalization Product Guide Version 10.0 AppSense Limited, 2016 All rights reserved. No part of this document may be produced in any form (including photocopying or storing
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationVersion 13.1 Web/VRU/CSR Update Installation and Configuration. June 9, 2008
Version 13.1 Web/VRU/CSR Update Installation and Configuration June 9, 2008 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Relius Administration
More informationFreeFlow Account Manangement Tool Customer Release Notes. Version
FreeFlow Account Manangement Tool Customer Release Notes Version 12.07.26 1 Table of Contents 1 Table of Contents...1 2 Introduction...2 2.1 How the Account Management Tool Works... 2 2.2 Installing AMT...
More informationDupScout DUPLICATE FILES FINDER
DupScout DUPLICATE FILES FINDER User Manual Version 10.3 Dec 2017 www.dupscout.com info@flexense.com 1 1 Product Overview...3 2 DupScout Product Versions...7 3 Using Desktop Product Versions...8 3.1 Product
More informationVMware Mirage Web Management Guide
VMware Mirage Web Management Guide Mirage 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for
More informationCounterACT Reports Plugin
CounterACT Reports Plugin Version 4.1.8 and Above Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Accessing the Reports Portal... 5 Saving Reports and Creating
More informationIvanti Patch for Windows Servers. Quick Start Guide
Ivanti Patch for Windows Servers Quick Start Guide Copyright and Trademarks Copyright and Trademarks This document contains the confidential information and/or proprietary property of Ivanti, Inc. and
More informationUsing McAfee VirusScan Enterprise 7.0 and 7.1 with Cisco CallManager. Application Note
Using McAfee VirusScan Enterprise 7.0 and 7.1 with Cisco CallManager Application Note Copyright 2003 Cisco Systems, Inc. Page 1 of 16 August 16, 2004 Table of Contents Introduction... 3 Installation...
More informationHow to Configure Anti-Virus to Permit SoftMiner Binaries
How to Configure Anti-Virus to Permit Binaries If you trust a file, file type, folder, or a process that anti-virus has detected as malicious, you can stop anti-virus from alerting you or blocking the
More informationDeep Security 9 vcenter Operations Manager Integration
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationCounterACT Wireless Plugin
CounterACT Wireless Plugin Version 1.7.0 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 5 How It Works... 6 About WLAN Controller/Lightweight Access Points...
More informationMcAfee Policy Auditor 6.2.2
Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More information